Threat Modeling: Attackers May Adapt, RespondReasons for failure in real-world security
This is a really interesting post* about how many simple solutions to border security fail in the real world.
Fact is, the majority of "but why don't you just..." solutions in this space either require lying, reliance on infrastructure that may be non-existent or jurisdictionally compromised, or fails openly.
- Not everywhere has the infrastructure necessary to upload large datasets to the cloud
- Most cloud providers are in not-great jurisdictions for some threat models.
- Lying to border authorities, even by omission, ends badly.
The "post" was originally a long Twitter thread, which is archived, for the moment, at ThreadReader App, which is a far, far better UI than Twitter.